Login / Signup

A large-scale empirical analysis of the vulnerabilities introduced by third-party components in IoT firmware.

Binbin ZhaoShouling JiJiacheng XuYuan TianQiuyang WeiQinying WangChenyang LyuXuhong ZhangChangting LinJingzheng WuRaheem Beyah
Published in: ISSTA (2022)
Keyphrases